US20130163833A1 - Security device with security image update capability - Google Patents
Security device with security image update capability Download PDFInfo
- Publication number
- US20130163833A1 US20130163833A1 US13/821,085 US201013821085A US2013163833A1 US 20130163833 A1 US20130163833 A1 US 20130163833A1 US 201013821085 A US201013821085 A US 201013821085A US 2013163833 A1 US2013163833 A1 US 2013163833A1
- Authority
- US
- United States
- Prior art keywords
- image
- reference image
- credential
- individual
- acquired
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G06K9/00288—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/50—Maintenance of biometric data or enrolment thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Definitions
- Security devices are used for a variety of purposes including controlling access to secured areas, items or information.
- Various devices and techniques are known for deciding when to grant access to authorized individuals.
- One such technique utilizes face identification and recognition (FIR).
- FIR face identification and recognition
- Typical FIR systems include a fixed gallery of images of faces of authorized individuals. A probe face image obtained by a face detector or camera is matched to a gallery image to identify the individual. If the individual is not known, the matching process is considered face recognition. If, on the other hand, the individual is known because of some other input to the system such as a personal identification number or security clearance code, the process is called face identification.
- One suggested approach includes setting up multiple gallery images for each person. Different gallery images are established under different lighting conditions, for example, to attempt to address variations in an image of an individual's face at different times of day, for example. It has also been suggested to use techniques for extracting features from a normalized face image and to process a probe image to identify the same features to make a comparison. Each of these techniques may address some situations, but not all. Additionally, each of these techniques involves additional processing and expense.
- An exemplary security device includes a controller that determines whether a security credential for an individual corresponds to an authorized credential.
- the controller also determines whether an acquired image of the individual corresponds to a reference image that is associated with the authorized credential.
- the controller determines if a correspondence between the acquired image and the reference image satisfies a selected criterion when the security credential corresponds to the authorized credential.
- the controller updates the reference image responsive to the selected criterion being satisfied.
- the controller updates the reference image by including the acquired image into the reference image and weighting the acquired image higher than other image information previously incorporated into the reference image.
- One aspect of the exemplary security device is that it allows for using image information obtained when an individual is attempting to gain access to a secured area for the dual purpose of determining whether the determined access should be granted and updating reference image information regarding that individual.
- An exemplary method of managing security image information includes determining whether a security credential for an individual corresponds to an authorized credential. A determination is made whether a correspondence between an acquired image and a reference image associated with the authorized credential satisfies a selected criterion when the security credential corresponds to the authorized credential. If the selected criterion is satisfied, the reference image is updated by including the acquired image into the reference image. The acquired image is weighted higher than other image information previously incorporated into the reference image.
- FIG. 1 schematically illustrates an example security device designed according to an embodiment of this invention.
- FIG. 2 schematically illustrates an example image updating technique.
- FIG. 3 is a flowchart diagram summarizing an example approach for managing security image information.
- FIG. 1 schematically shows a security device 20 that provides control over whether access to a secured area may be granted and allows for updating security image information.
- a controller 22 includes an access control portion 24 that provides control over a device such as a lock 26 to maintain security over a secured area, item or information, for example. The controller 22 determines whether an individual 28 will be granted access to a secured area and manages security image information.
- the security device 20 includes a security credential reader 30 that obtains security credential information for the individual 28 .
- the illustrated example includes a credential holder 34 such as a smart card, key fob, identification card or another known device.
- the security credential holder 34 provides credential information to the security credential reader 30 .
- wireless communication between the security credential reader 30 and the credential holder 34 provides the necessary information to the security credential reader 30 so that an indication of the security credential information may be provided to the controller 22 .
- Another example includes a bar code reader or magnetic strip reader as part of the security credential reader 30 .
- Another example includes a manual input such as a touch screen or key pad that allows the individual 28 to enter security code or identification information so that it is acquired by the security credential reader 30 .
- the controller 22 determines whether security credential information for the individual 28 corresponds to a known authorized credential within a database 36 . If there is a corresponding or matching authorized credential within the database 36 , the security credential information obtained by the reader 30 is considered valid.
- the controller 22 in this example will not control the lock 26 to allow access to the individual 28 without also obtaining a satisfactory image of the individual 28 from a camera 38 .
- the camera 38 is arranged to acquire an image of the face of the individual 28 .
- An indication of an acquired image is provided to the controller 22 .
- the database 36 includes a reference image associated with each authorized credential.
- the reference image is an image of the individual to whom the authorized credential has been assigned.
- the controller 22 determines when there is sufficient correspondence between the acquired image and the reference image to grant the desired access to the individual 28 .
- An appropriate correspondence threshold for purposes of granting access to an individual accommodates variations in the acquired image and the reference image of that individual. Given this description, those skilled in the art will be able to select an appropriate correspondence threshold for controlling access to a secured area with a sufficient level of confidence that the individual 28 is the same individual that is the subject of the appropriate reference image.
- the access control portion 24 of the controller 22 determines that the determined access may be granted.
- the lock 26 may then be unlocked, for example.
- the example device 20 allows for using the combination of security credential information and face identification and recognition techniques to control access to a secured area.
- the example device 20 also manages security image information by facilitating an update of the reference image information regarding an individual.
- FIG. 2 schematically illustrates an example approach in which an image averaging portion 40 of the controller 22 updates a reference image for an individual.
- the reference image in this example is shown at 42 .
- the reference image in one example is based upon a captured image of an individual that is used for setting up the database 36 so that the reference image is associated with the correct authorized credential.
- the reference image is based on an average of acquired images during the training or database establishment stage. For example, various images of the individual may be acquired with slightly different lighting conditions and different camera angles, for example. These images are combined and averaged to generate the reference image 42 .
- the initial reference image information may be acquired using the camera 38 or a separate camera dedicated to establishing a reference image.
- An acquired image 44 is obtained when the individual presents security credential information at a time that the individual desires access to a secured area.
- the image averaging portion 40 of the controller 22 updates the reference image 42 .
- the image averaging portion 40 uses an image averaging technique that includes aligning or registering corresponding facial features from the current reference image and the acquired image in a known manner.
- the aligned facial features are then warped to a canonical space using a known technique.
- the averaging in this example occurs in the warped space. Given this description, those skilled in the art will be able to select an appropriate averaging technique to meet their particular needs.
- information regarding the acquired image 44 is weighted differently than information already incorporated into the reference image 42 .
- the weighting assigned to the acquired image 44 is higher than the weighting assigned to image information previously incorporated into the reference image 42 as shown at 48 .
- the acquired image 44 is the most recent image obtained of a particular individual. That image information is considered the most reliable for how that individual looks especially at the location where access to a secured area is desired. This example includes assigning a higher weight to the most recent image when updating the reference image.
- the resulting updated reference image is shown at 50 , which comprises a combination of the information used for generating the reference image 42 and the more heavily weighted information regarding the acquired image 44 averaged together to generate the updated reference image 50 .
- One example includes weighting the previous or older images such that the influence of those images on the updated reference image is in an exponential decay. This approach allows for only the most recently acquired images to have a substantial effect on the updated reference image.
- An exponential decay rate of influence or effect causes an acquired image to have a substantial effect on the updated reference image for a short time or for a few updates and that allows for more accurately updating the reference image.
- the decay rate in one example is based on time.
- the time of an acquired image is one factor that impacts the amount of influence the contents of that image has on the updated reference image. After some time has passed since an image has been acquired, the influence that image has on any subsequent updates of the reference image decreases exponentially.
- the decay rate is based on a number of image updates. With each update to the reference image subsequent to an image being acquired, the effect of that image on the updating of the reference image decreases or decays exponentially. In one example, once an acquired image has been used for two reference image updates, the influence of the contents of that image on subsequent updates to the reference image or the weighting assigned to that image decreases significantly at rate corresponding to an exponential decay rate.
- FIG. 3 includes a flowchart diagram 60 that summarizes one example approach.
- the security credential information is obtained by the security credential reader 30 .
- the controller 22 determines if the security credential information corresponds to an authorized credential in the database 36 . If not, access is denied at 66 . In this example, the controller 22 provides and an indication regarding the denial of attempted access to another device in a security system, security personnel, the individual 28 or a combination of these.
- the reference image associated with the authorized credential is identified at 68 .
- An image of the individual is acquired at 70 .
- the order of steps 64 , 68 , 70 and 72 need not be sequential as illustrated in FIG. 3 .
- the image of the individual may be acquired before, after or during a time when the determination is made whether the security credential corresponds to an authorized credential.
- the particular order of the steps is not as important as performing each of them to confirm that an individual providing security credential information is the correct individual to have that information.
- a determination at 76 indicates whether the acquired image corresponds to the associated reference image sufficiently to update the reference image.
- a first correspondence threshold is used for purposes of determining whether to grant access at 74 .
- a second, stricter correspondence threshold is used for determining whether to update the reference image at 76 . It is possible, for example, to accept a lower amount of correspondence between the images for purposes of granting access and to require a closer correspondence between those images for purposes of incorporating the acquired image into the reference image.
- the reference image is updated with the acquired image including assigning the acquired image a higher weighting than image information previously incorporated into the reference image. This allows for updating the reference image with the most current information regarding that individual.
- the reference image is not updated if the determination at 76 indicates that there is insufficient correspondence between the reference image and the acquired image.
- the disclosed example utilizes access security information to assist in establishing a reference image for a particular individual. Combining a determination regarding security credential information and facial image and recognition techniques allows for more accurately establishing a reference image compared to a purely image-based approach.
- the ability to update the reference image based on acquired image information obtained at a location where the individual desires access allows for using realistic lighting and other conditions to establish the reference image. This provides for more accurate determinations when subsequent access attempts are made.
- Weighting the image information by emphasizing the more recently acquired image allows for robust face recognition that compensates for different illumination conditions when initial reference images are taken during a training phase, for example. It also accommodates for a different viewpoint of the particular camera used at the point where the individual desires access to a secured area.
- the same devices that are used for controlling access are used for establishing initial reference images. This eliminates the need for a dedicated room and special imaging equipment for setting up a database of reference images, for example. Additionally, using the same devices that control access for purposes of updating the image information streamlines the process of updating or expanding an image database used for security control purposes.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Collating Specific Patterns (AREA)
Abstract
An exemplary security device includes a controller that determines whether a security credential for an individual corresponds to an authorized credential. The controller also determines whether an acquired image of the individual corresponds to a reference image that is associated with the authorized credential. The controller determines if a correspondence between the acquired image and the reference image satisfies a selected criterion when the security credential corresponds to the authorized credential. The controller updates the reference image responsive to the selected criterion being satisfied. The controller updates the reference image by including the acquired image into the reference image and weighting the acquired image higher than other image information previously incorporated into the reference image.
Description
- Security devices are used for a variety of purposes including controlling access to secured areas, items or information. Various devices and techniques are known for deciding when to grant access to authorized individuals. One such technique utilizes face identification and recognition (FIR). Typical FIR systems include a fixed gallery of images of faces of authorized individuals. A probe face image obtained by a face detector or camera is matched to a gallery image to identify the individual. If the individual is not known, the matching process is considered face recognition. If, on the other hand, the individual is known because of some other input to the system such as a personal identification number or security clearance code, the process is called face identification.
- There are various challenges associated with using FIR techniques for security purposes. For example, there are variations in an image of an individual's face at different times for different reasons. Lighting conditions and different camera angles influence the ability to determine whether a probe image corresponds to a gallery image. Additionally, different facial expressions can have an impact on the ability to find appropriate correspondence between images. An individual's face also changes over time because of aging or changes in hairstyle, eyeglass styles, facial hair and age. It is difficult to address the many possible variations in the way an individual looks over time for purposes of being able to repeatedly and accurately use an FIR technique.
- One suggested approach includes setting up multiple gallery images for each person. Different gallery images are established under different lighting conditions, for example, to attempt to address variations in an image of an individual's face at different times of day, for example. It has also been suggested to use techniques for extracting features from a normalized face image and to process a probe image to identify the same features to make a comparison. Each of these techniques may address some situations, but not all. Additionally, each of these techniques involves additional processing and expense.
- Another suggestion is to use infrared or thermal imaging instead of video imaging. The cost associated with such systems is significantly higher and prohibits them from being used in many applications.
- An exemplary security device includes a controller that determines whether a security credential for an individual corresponds to an authorized credential. The controller also determines whether an acquired image of the individual corresponds to a reference image that is associated with the authorized credential. The controller determines if a correspondence between the acquired image and the reference image satisfies a selected criterion when the security credential corresponds to the authorized credential. The controller updates the reference image responsive to the selected criterion being satisfied. The controller updates the reference image by including the acquired image into the reference image and weighting the acquired image higher than other image information previously incorporated into the reference image.
- One aspect of the exemplary security device is that it allows for using image information obtained when an individual is attempting to gain access to a secured area for the dual purpose of determining whether the determined access should be granted and updating reference image information regarding that individual.
- An exemplary method of managing security image information includes determining whether a security credential for an individual corresponds to an authorized credential. A determination is made whether a correspondence between an acquired image and a reference image associated with the authorized credential satisfies a selected criterion when the security credential corresponds to the authorized credential. If the selected criterion is satisfied, the reference image is updated by including the acquired image into the reference image. The acquired image is weighted higher than other image information previously incorporated into the reference image.
- The various features and advantages of disclosed examples will become apparent to those skilled in the art from the following detailed description. The drawings that accompany the detailed description can be briefly described as follows.
-
FIG. 1 schematically illustrates an example security device designed according to an embodiment of this invention. -
FIG. 2 schematically illustrates an example image updating technique. -
FIG. 3 is a flowchart diagram summarizing an example approach for managing security image information. -
FIG. 1 schematically shows asecurity device 20 that provides control over whether access to a secured area may be granted and allows for updating security image information. Acontroller 22 includes anaccess control portion 24 that provides control over a device such as alock 26 to maintain security over a secured area, item or information, for example. Thecontroller 22 determines whether an individual 28 will be granted access to a secured area and manages security image information. - The
security device 20 includes asecurity credential reader 30 that obtains security credential information for the individual 28. The illustrated example includes acredential holder 34 such as a smart card, key fob, identification card or another known device. Thesecurity credential holder 34 provides credential information to thesecurity credential reader 30. In one example, wireless communication between thesecurity credential reader 30 and thecredential holder 34 provides the necessary information to thesecurity credential reader 30 so that an indication of the security credential information may be provided to thecontroller 22. Another example includes a bar code reader or magnetic strip reader as part of thesecurity credential reader 30. Another example includes a manual input such as a touch screen or key pad that allows the individual 28 to enter security code or identification information so that it is acquired by thesecurity credential reader 30. - The
controller 22 determines whether security credential information for the individual 28 corresponds to a known authorized credential within adatabase 36. If there is a corresponding or matching authorized credential within thedatabase 36, the security credential information obtained by thereader 30 is considered valid. - The
controller 22 in this example will not control thelock 26 to allow access to the individual 28 without also obtaining a satisfactory image of the individual 28 from acamera 38. In this example, thecamera 38 is arranged to acquire an image of the face of the individual 28. An indication of an acquired image is provided to thecontroller 22. - The
database 36 includes a reference image associated with each authorized credential. The reference image is an image of the individual to whom the authorized credential has been assigned. Thecontroller 22 determines when there is sufficient correspondence between the acquired image and the reference image to grant the desired access to the individual 28. An appropriate correspondence threshold for purposes of granting access to an individual accommodates variations in the acquired image and the reference image of that individual. Given this description, those skilled in the art will be able to select an appropriate correspondence threshold for controlling access to a secured area with a sufficient level of confidence that theindividual 28 is the same individual that is the subject of the appropriate reference image. - When there is sufficient correspondence between the authorized credential and the security credential on the one hand and between the reference image and the acquired image on the other hand, the
access control portion 24 of thecontroller 22 determines that the determined access may be granted. Thelock 26 may then be unlocked, for example. - The
example device 20 allows for using the combination of security credential information and face identification and recognition techniques to control access to a secured area. Theexample device 20 also manages security image information by facilitating an update of the reference image information regarding an individual.FIG. 2 schematically illustrates an example approach in which animage averaging portion 40 of thecontroller 22 updates a reference image for an individual. The reference image in this example is shown at 42. The reference image in one example is based upon a captured image of an individual that is used for setting up thedatabase 36 so that the reference image is associated with the correct authorized credential. In some examples, the reference image is based on an average of acquired images during the training or database establishment stage. For example, various images of the individual may be acquired with slightly different lighting conditions and different camera angles, for example. These images are combined and averaged to generate thereference image 42. The initial reference image information may be acquired using thecamera 38 or a separate camera dedicated to establishing a reference image. - An acquired
image 44 is obtained when the individual presents security credential information at a time that the individual desires access to a secured area. When correspondence between thereference image 42 and the acquiredimage 44 satisfies a selected criterion, theimage averaging portion 40 of thecontroller 22 updates thereference image 42. There are known image averaging techniques and one example embodiment includes such a known technique. - In one example, the
image averaging portion 40 uses an image averaging technique that includes aligning or registering corresponding facial features from the current reference image and the acquired image in a known manner. The aligned facial features are then warped to a canonical space using a known technique. The averaging in this example occurs in the warped space. Given this description, those skilled in the art will be able to select an appropriate averaging technique to meet their particular needs. - As schematically shown in
FIG. 2 , information regarding the acquiredimage 44 is weighted differently than information already incorporated into thereference image 42. As shown at 46, the weighting assigned to the acquiredimage 44 is higher than the weighting assigned to image information previously incorporated into thereference image 42 as shown at 48. The acquiredimage 44 is the most recent image obtained of a particular individual. That image information is considered the most reliable for how that individual looks especially at the location where access to a secured area is desired. This example includes assigning a higher weight to the most recent image when updating the reference image. - The resulting updated reference image is shown at 50, which comprises a combination of the information used for generating the
reference image 42 and the more heavily weighted information regarding the acquiredimage 44 averaged together to generate the updatedreference image 50. - One example includes weighting the previous or older images such that the influence of those images on the updated reference image is in an exponential decay. This approach allows for only the most recently acquired images to have a substantial effect on the updated reference image. An exponential decay rate of influence or effect causes an acquired image to have a substantial effect on the updated reference image for a short time or for a few updates and that allows for more accurately updating the reference image.
- The decay rate in one example is based on time. In one such example, the time of an acquired image is one factor that impacts the amount of influence the contents of that image has on the updated reference image. After some time has passed since an image has been acquired, the influence that image has on any subsequent updates of the reference image decreases exponentially.
- In another example the decay rate is based on a number of image updates. With each update to the reference image subsequent to an image being acquired, the effect of that image on the updating of the reference image decreases or decays exponentially. In one example, once an acquired image has been used for two reference image updates, the influence of the contents of that image on subsequent updates to the reference image or the weighting assigned to that image decreases significantly at rate corresponding to an exponential decay rate.
-
FIG. 3 includes a flowchart diagram 60 that summarizes one example approach. At 62, the security credential information is obtained by thesecurity credential reader 30. At 64, thecontroller 22 determines if the security credential information corresponds to an authorized credential in thedatabase 36. If not, access is denied at 66. In this example, thecontroller 22 provides and an indication regarding the denial of attempted access to another device in a security system, security personnel, the individual 28 or a combination of these. - If the security credential information corresponds to an authorized credential, the reference image associated with the authorized credential is identified at 68. An image of the individual is acquired at 70. At 72, a determination is made whether the acquired image corresponds to the associated reference image sufficiently to grant access to that individual. If not, access is denied at 66 and appropriate indications are provided. If there is sufficient correspondence between the acquired image and the reference image associated with the authorized credential that corresponds to the provided security credential, then access is granted at 74.
- It is worth noting that the order of
steps FIG. 3 . For example, the image of the individual may be acquired before, after or during a time when the determination is made whether the security credential corresponds to an authorized credential. Additionally, it may be possible to acquire the image of the individual before, during or after identifying the reference image associated with the appropriate authorized credential. The particular order of the steps is not as important as performing each of them to confirm that an individual providing security credential information is the correct individual to have that information. When there is sufficient correspondence between the security credential information and the authorized credential information on the one hand and between the acquired image and the reference image on the other hand, it is possible to grant access to an individual desiring such access. - In this example, it is also possible to update the reference image information using the
security device 20. A determination at 76 indicates whether the acquired image corresponds to the associated reference image sufficiently to update the reference image. In this example, a first correspondence threshold is used for purposes of determining whether to grant access at 74. A second, stricter correspondence threshold is used for determining whether to update the reference image at 76. It is possible, for example, to accept a lower amount of correspondence between the images for purposes of granting access and to require a closer correspondence between those images for purposes of incorporating the acquired image into the reference image. - As shown at 78, the reference image is updated with the acquired image including assigning the acquired image a higher weighting than image information previously incorporated into the reference image. This allows for updating the reference image with the most current information regarding that individual. As shown at 80, the reference image is not updated if the determination at 76 indicates that there is insufficient correspondence between the reference image and the acquired image.
- The disclosed example utilizes access security information to assist in establishing a reference image for a particular individual. Combining a determination regarding security credential information and facial image and recognition techniques allows for more accurately establishing a reference image compared to a purely image-based approach. The ability to update the reference image based on acquired image information obtained at a location where the individual desires access allows for using realistic lighting and other conditions to establish the reference image. This provides for more accurate determinations when subsequent access attempts are made.
- Weighting the image information by emphasizing the more recently acquired image allows for robust face recognition that compensates for different illumination conditions when initial reference images are taken during a training phase, for example. It also accommodates for a different viewpoint of the particular camera used at the point where the individual desires access to a secured area.
- In one example, the same devices that are used for controlling access are used for establishing initial reference images. This eliminates the need for a dedicated room and special imaging equipment for setting up a database of reference images, for example. Additionally, using the same devices that control access for purposes of updating the image information streamlines the process of updating or expanding an image database used for security control purposes.
- The preceding description is exemplary rather than limiting in nature. Variations and modifications to the disclosed examples may become apparent to those skilled in the art that do not necessarily depart from the essence of this invention. The scope of legal protection given to this invention can only be determined by studying the following claims.
Claims (16)
1. A security device, comprising:
a controller that is configured to
determine whether a security credential for an individual corresponds to an authorized credential and an acquired image of the individual corresponds to a reference image that is associated with the authorized credential,
determine if a correspondence between the acquired image and the reference image satisfies a selected criterion when the security credential corresponds to the authorized credential, and
update the reference image responsive to the selected criterion being satisfied, the controller updating the reference image by including the acquired image into the reference image and weighting the acquired image higher than other image information previously incorporated into the reference image.
2. The security device of claim 1 , wherein the reference image comprises an image of the individual's face and the acquired image comprises an image of the individual's face.
3. The security device of claim 1 , comprising
a credential reader that acquires the security credential from the individual and provides an indication of the acquired security credential to the controller; and
a camera that acquires the image of the individual and provides an indication of the acquired image to the controller.
4. The security device of claim 1 , wherein the reference image comprises an average of a plurality of images and the updated reference image comprises an average of the acquired image and the reference image.
5. The security device of claim 1 , wherein the controller determines to grant access to the individual when correspondence between the acquired image and the reference image satisfies a first threshold and the controller updates the reference image when the correspondence between the acquired image and the reference image satisfies a second, stricter threshold.
6. The security device of claim 1 , wherein
the controller provides an indication of a first condition wherein the security credential corresponds to the authorized credential and the acquired image does not correspond to the reference image and
the controller provides an indication of a second condition wherein the acquired image corresponds to the reference image and the security credential does not correspond to the authorized credential.
7. The security device of claim 1 , comprising a database including a plurality of authorized credentials each having an associated reference image and wherein the controller accesses the database.
8. The security device of claim 1 , wherein the weighting of the acquired image and the other image information previously incorporated into the reference image results in a decreasing effect of the other image information on an update of the reference image, the decreasing effect decreasing at rate that corresponds to an exponential decay.
9. A method of managing security image information, comprising the steps of:
determining whether a security credential for an individual corresponds to an authorized credential;
determining whether an acquired image of the individual corresponds to a reference image that is associated with the authorized credential,
determining if a correspondence between the acquired image and the reference image satisfies a selected criterion when the security credential corresponds to the authorized credential; and
updating the reference image responsive to the selected criteria being satisfied, the updating comprising including the acquired image into the reference image and weighting the acquired image higher than other image information previously incorporated into the reference image.
10. The method of claim 9 , wherein the reference image comprises an image of the individual's face and the acquired image comprises an image of the individual's face.
11. The method of claim 9 , comprising
acquiring the security credential from the individual; and
acquiring the image of the individual.
12. The method of claim 9 , comprising
establishing the reference image by averaging a plurality of images; and
updating the reference image by averaging the acquired image and the reference image.
13. The method of claim 9 , comprising
using an updating correspondence threshold as the selected criteria, the updating correspondence threshold being a correspondence between the acquired image and the reference image that exceeds an access correspondence threshold used for determining whether to grant access to the individual.
14. The method of claim 9 , comprising
providing an indication of a first condition wherein the security credential corresponds to the authorized credential and the acquired image does not correspond to the reference image and
providing an indication of a second condition wherein the acquired image corresponds to the reference image and the security credential does not correspond to the authorized credential.
15. The method of claim 9 , comprising
storing a plurality of authorized credentials each having an associated reference image in a database.
16. The method of claim 9 , comprising
weighting the acquired image and the other image information previously incorporated into the reference image in a manner that results in a decreasing effect of the other image information on an update of the reference image, the decreasing effect decreasing at rate that corresponds to an exponential decay.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2010/049200 WO2012036692A1 (en) | 2010-09-17 | 2010-09-17 | Security device with security image update capability |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130163833A1 true US20130163833A1 (en) | 2013-06-27 |
Family
ID=45831885
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/821,085 Abandoned US20130163833A1 (en) | 2010-09-17 | 2010-09-17 | Security device with security image update capability |
Country Status (2)
Country | Link |
---|---|
US (1) | US20130163833A1 (en) |
WO (1) | WO2012036692A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170200051A1 (en) * | 2012-10-09 | 2017-07-13 | International Business Machines Corporation | Re-identifying an object in a test image |
US20200133254A1 (en) * | 2018-05-07 | 2020-04-30 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for data collection, learning, and streaming of machine signals for part identification and operating characteristics determination using the industrial internet of things |
US11562610B2 (en) | 2017-08-01 | 2023-01-24 | The Chamberlain Group Llc | System and method for facilitating access to a secured area |
US11574512B2 (en) | 2017-08-01 | 2023-02-07 | The Chamberlain Group Llc | System for facilitating access to a secured area |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019026086A1 (en) * | 2017-07-31 | 2019-02-07 | Smartron India Private Limited | A system and method for dynamically updating personal identity information |
WO2019027504A1 (en) * | 2017-08-01 | 2019-02-07 | Apple Inc. | Process for updating templates used in facial recognition |
CN109325394B (en) | 2017-08-01 | 2022-06-21 | 苹果公司 | Determining sparse pattern illumination and dense pattern illumination |
US10210381B1 (en) | 2017-08-01 | 2019-02-19 | Apple Inc. | Multiple enrollments in facial recognition |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030039380A1 (en) * | 2001-08-24 | 2003-02-27 | Hiroshi Sukegawa | Person recognition apparatus |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2359269A1 (en) * | 2001-10-17 | 2003-04-17 | Biodentity Systems Corporation | Face imaging system for recordal and automated identity confirmation |
KR20040028210A (en) * | 2002-09-30 | 2004-04-03 | 주식회사 드림미르 | Apparatus for Identifying a Person through Recognizing a Face and Method thereof |
EP2263190A2 (en) * | 2008-02-13 | 2010-12-22 | Ubisoft Entertainment S.A. | Live-action image capture |
-
2010
- 2010-09-17 US US13/821,085 patent/US20130163833A1/en not_active Abandoned
- 2010-09-17 WO PCT/US2010/049200 patent/WO2012036692A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030039380A1 (en) * | 2001-08-24 | 2003-02-27 | Hiroshi Sukegawa | Person recognition apparatus |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170200051A1 (en) * | 2012-10-09 | 2017-07-13 | International Business Machines Corporation | Re-identifying an object in a test image |
US10169664B2 (en) * | 2012-10-09 | 2019-01-01 | International Business Machines Corporation | Re-identifying an object in a test image |
US20190095719A1 (en) * | 2012-10-09 | 2019-03-28 | International Business Machines Corporation | Re-identifying an object in a test image |
US10607089B2 (en) * | 2012-10-09 | 2020-03-31 | International Business Machines Corporation | Re-identifying an object in a test image |
US11562610B2 (en) | 2017-08-01 | 2023-01-24 | The Chamberlain Group Llc | System and method for facilitating access to a secured area |
US11574512B2 (en) | 2017-08-01 | 2023-02-07 | The Chamberlain Group Llc | System for facilitating access to a secured area |
US11941929B2 (en) | 2017-08-01 | 2024-03-26 | The Chamberlain Group Llc | System for facilitating access to a secured area |
US12106623B2 (en) | 2017-08-01 | 2024-10-01 | The Chamberlain Group Llc | System and method for facilitating access to a secured area |
US20200133254A1 (en) * | 2018-05-07 | 2020-04-30 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for data collection, learning, and streaming of machine signals for part identification and operating characteristics determination using the industrial internet of things |
Also Published As
Publication number | Publication date |
---|---|
WO2012036692A1 (en) | 2012-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130163833A1 (en) | Security device with security image update capability | |
US20230401914A1 (en) | Information processing apparatus, information processing system, and information processing method | |
US8079061B2 (en) | Authentication system managing method | |
US7986817B2 (en) | Verification apparatus, verification method and verification program | |
US8493178B2 (en) | Forged face detecting method and apparatus thereof | |
US11997087B2 (en) | Mobile enrollment using a known biometric | |
WO2019138688A1 (en) | Facial recognition device | |
JP7485158B2 (en) | Facility management system, facility management method, and computer program | |
JP2010009389A (en) | Dictionary information registration device, dictionary information registration method, face authentication device, and access control system | |
JP7517393B2 (en) | Facility management device, facility management method, and computer program | |
US20240169779A1 (en) | Entry/exit management system, entry/exit management method, and recording medium | |
JP4705511B2 (en) | Face image matching device | |
JP4705512B2 (en) | Face image matching device | |
KR101926709B1 (en) | Control apparatus for biometric and method thereof | |
JP6767685B2 (en) | Face recognition device | |
WO2023132194A1 (en) | Authentication system, authentication device, and authentication method | |
EP4002166A1 (en) | Method and system for biometric authentication for large numbers of enrolled persons | |
JP6214908B2 (en) | Verification device and verification method | |
JP2020201988A (en) | Face authentication device | |
JP2006293913A (en) | Person recognition device, person recognition method, and entry and exit management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: UTC FIRE & SECURITY CORPORATION, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, HONGCHENG;JIA, ZHEN;XIONG, ZIYOU;AND OTHERS;SIGNING DATES FROM 20100913 TO 20100914;REEL/FRAME:030408/0535 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |